CFP last date
20 March 2024
Call for Paper
April Edition
IJCA solicits high quality original research papers for the upcoming April edition of the journal. The last date of research paper submission is 20 March 2024

Submit your paper
Know more
Reseach Article

CARF-F: Conditional Active RREQ Flooding-Filter based Prevention Scheme for AODV in MANET

by Neha Kamdar, Neeraj Paliwal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 100 - Number 4
Year of Publication: 2014
Authors: Neha Kamdar, Neeraj Paliwal

Neha Kamdar, Neeraj Paliwal . CARF-F: Conditional Active RREQ Flooding-Filter based Prevention Scheme for AODV in MANET. International Journal of Computer Applications. 100, 4 ( August 2014), 42-47. DOI=10.5120/17516-8076

@article{ 10.5120/17516-8076,
author = { Neha Kamdar, Neeraj Paliwal },
title = { CARF-F: Conditional Active RREQ Flooding-Filter based Prevention Scheme for AODV in MANET },
journal = { International Journal of Computer Applications },
issue_date = { August 2014 },
volume = { 100 },
number = { 4 },
month = { August },
year = { 2014 },
issn = { 0975-8887 },
pages = { 42-47 },
numpages = {9},
url = { },
doi = { 10.5120/17516-8076 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2024-02-06T22:29:07.039160+05:30
%A Neha Kamdar
%A Neeraj Paliwal
%T CARF-F: Conditional Active RREQ Flooding-Filter based Prevention Scheme for AODV in MANET
%J International Journal of Computer Applications
%@ 0975-8887
%V 100
%N 4
%P 42-47
%D 2014
%I Foundation of Computer Science (FCS), NY, USA

Wireless network is a growing field of latest technology because of its increased popularities over the rural and urban areas. Such network provides the mobility based service usage and hence removes the location dependencies for the users of mobile devices such as laptops, cell phones, Tablets and PDA's. These networks are categorized on the basis of their infrastructural usage and range of transmissions. Mobile ad-hoc network is one of its types having infrastructure less environment performing short range communications. In this the overall responsibility of communication is shifted from networked components to mobile node itself working as a router. As the facility is increased some relaxation is also made available for malicious users and hence it is more susceptible to network attack due to its open environment and dynamically changing nature. Flooding is used for the most performed network attack aims at degrading the network performance by inserting the several dummy RREQ packets in the network. These packets are large in quantity and hence consume lots of network resources such as, bandwidth and nodes battery power. Over the last few years various approaches is been suggested to overcome flooding related issues. Even after these traditional flooding attacks solutions, there are some problems which remain unsolved like: isolation of fake RREQ from actual packets, maliciousness percentage based on nodes behaviour and previous participation, probability of malicious flooded packet detections. Thus this paper proposes a novel CARF-F based flooding attack detection and removal mechanism for AODV protocol. At the initial level of analytical results the approach is proving its strong presence in near future.

  1. D. Karun K Reddy, K. Sandhya R Kundra, M . Ratnakar Babu, Dr. L. Prassana Kumar, "Prevention of Routing Attack in Mobile Ad-Hoc Networks: A comparative study, in International Journal of Research in Computer and Communication technology, IJRCCT, ISSN 2278-5841, Vol. 1, Issue 5, October 2012.
  2. Sudhir Agrawal, Sanjeev Jain, Sanjeev Sharma, "A Survey of Routing Attacks and Security Measures in Mobile Ad-Hoc Networks", in Journal of Computing, ISSN 2151-9617, Vol. 3, Issue 1, Jan 2011.
  3. Jaydip Sen, M. Girish Chandra, P. Balamuralidhar, Harihara S. G. and Harish Reddy, "A Distributed Protocol for Detection of Packet Dropping Attack in Mobile Ad Hoc Networks", by Embedded Systems Research Group, Tata Consultancy Service s, Bangalore-560066, India.
  4. Isa Maleki1, Ramin Habibpour, Majid Ahadi and Amin Kamalinia, "Security in Routing Protocols of Ad-Hoc networks: A Review", in International Journal of Mobile Network Communications & Telematics (IJMNCT), doi: 10. 5121/ijmnct. 2013. 3403, Vol. 3, No. 4, August 2013.
  5. Bing Wu, Jianmin Chen, Jie Wu, Mihaela Cardei, "A Survey on Attacks and Countermeasures in Mobile Ad Hoc Networks", in Wireless Mobile Network Security, Chapter 12, Springer, 2006.
  6. Ms. Neetu Singh Chouhan and Ms. Shweta Yadav, "Flooding Attacks Prevention in MANET", in International Journal of Computer Technology and Electronics Engineering (IJCTEE), ISSN: 2249-6343, Vol. 1, Issue 3, 2012.
  7. Jian-Hua Song1, 2, Fan Hong1, Yu Zhang, "Effective Filtering Scheme against RREQ Flooding Attack in Mobile Ad Hoc Networks", in IEEE Computer Society , ISSN:0-7695-2736-1/06, 2006.
  8. Venkatesan Balakrishnan, Vijay Varadharajan and Udaya Kiran Tupakula, "Fellowship: Defense against Flooding and Packet Drop Attacks in MANET", in INSS Research Group, Department of Computing, Macquarie University, North Ryde, Sydney, NSW Australia 2109
  9. Shishir K. Shandilya and Sunita Sahu, "A Trust Based Security Scheme for RREQ Flooding Attack in MANET", in International Journal of Computer Application, ISSN: 0975 – 888, Vol. 5– No. 12, August 2010.
  10. Ujwala D. Khartad & R. K. Krishna, "Route Request Flooding Attack Using Trust based Security Scheme in Manet", in International Journal of Smart Sensors and Ad Hoc Networks (IJSSAN) ISSN No. 2248?9738 Volume 1, Issue 4, 2012.
  11. Neha Singh, Sumit Chaudhary , Kapil Kumar Verma and A. K. Vatsa , "Explicit Query based Detection and Prevention Techniques for DDOS in MANET", in International Journal of Computer Applications, ISSN:0975 – 8887, Vol. 53– No. 2, September 2012.
  12. Meghna Chhabra and B. B. Gupta, "An Efficient Scheme to Prevent DDoS Flooding Attacks in Mobile Ad-Hoc Network (MANET)", in Research Journal of Applied Sciences, Engineering and Technology, ISSN: 2033-2039, Vol. 7, Issue. 10 March 2014.
  13. HyoJin Kim, Ramachandra Bhargav Chitti and JooSeok Song, "Handling Malicious Flooding Attacks through Enhancement of Packet Processing Technique in Mobile Ad Hoc Networks", in Journal of Information Processing Systems, DOI : 10. 3745/JIPS. 2011. 7. 1. 137, Vol. 7, No. 1, March 2011.
  14. Venkat Balakrishnan, Vijay Varadharajan, and Uday Tupakula and Marie Elisabeth Gaup Moe, "Mitigating Flooding Attacks in Mobile Ad-hoc Networks Supporting Anonymous Communications", in Information and Networked Systems Security Research (INSS) Group, Department of Computing, Macquarie University, Sydney, Australia
  15. Revathi Venkataraman, M. Pushpalatha, and T. Rama Rao, "Performance Analysis of Flooding Attack Prevention Algorithm in MANETs", in World Academy of Science, Engineering and Technology, 2009.
Index Terms

Computer Science
Information Sciences


Wireless network MANET (Mobile Ad-Hoc Network) AODV Network Attacks Flooding Attack Rate Threshold Limit CARF-F (Conditional Active RREQ Flooding-Filter).